{"payload":{"header_redesign_enabled":false,"results":[{"id":"198040948","archived":false,"color":"#3572A5","followers":15,"has_funding_file":false,"hl_name":"BehzaDMagzer/Auto-PostXploit","hl_trunc_description":"Windows Auto Post Exploitation - For ReD Team","language":"Python","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":198040948,"name":"Auto-PostXploit","owner_id":42499625,"owner_login":"BehzaDMagzer","updated_at":"2019-07-21T12:19:14.557Z","has_issues":true}},"sponsorable":false,"topics":["remote-control","hack","hacking","hackerrank","rat","post","remote-shell","post-exploitation","exploitation","remote-access","hacktoberfest","hacking-tool","hackerrank-solutions","remote-admin-tool","awesome-hacking","hacking-framework","hacking-tools","hacking-code","hackingcode","hackingtools"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":57,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253ABehzaDMagzer%252FAuto-PostXploit%2B%2Blanguage%253APython","metadata":null,"csrf_tokens":{"/BehzaDMagzer/Auto-PostXploit/star":{"post":"GT_m85cDdXN76MOYFjmVPfdfvf5ir4A3PSfM-cVRrFzvfRsjrVeyMzrN8rATHwu1gwJIcDt3sYXpu5x7cmMw_A"},"/BehzaDMagzer/Auto-PostXploit/unstar":{"post":"oRRzdEOarJgLuIMY76oLaw0Y0sCeBKeJbd0FHNHvAMWHI6ODudE4ghocoF71BSipgzyfhE7y5Gwb5b-cH8vN6g"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"P_aYJRY9Gik-WHUDMU_krhVfkPJgnnV1Ju5lUKw8BDJkebpvGkFkoUp0px2_ZOEktMVyDqAQRTebx9SDOHpmcQ"}}},"title":"Repository search results"}